Service Oriented Architecture Security Risks and their Mitigation

Size: px
Start display at page:

Download "Service Oriented Architecture Security Risks and their Mitigation"

Transcription

1 Service Oriented Architecture Security Risks and their Mitigation Sarath Indrakanti Command, Control, Communications and Intelligence Division Defence Science and Technology Organisation DSTO-TN-1126 ABSTRACT Service Oriented Architecture (SOA) is an architectural paradigm and its aim is to achieve a loose coupling amongst interacting distributed systems. SOA is used by enterprises to efficiently and cost-effectively integrate heterogeneous systems. However, SOA is affected by several security vulnerabilities, thus affecting the speed of its deployment in organisations. In this report, we describe some of the security threats faced by SOA systems and corresponding risk mitigation measures by means of security technology, standards and products. RELEASE LIMITATION Approved for public release

2 Published by Command, Control, Communications and Intelligence Division DSTO Defence Science and Technology Organisation PO Box 1500 Edinburgh South Australia 5111 Australia Telephone: (08) Fax: (08) Commonwealth of Australia 2012 AR October 2012 APPROVED FOR PUBLIC RELEASE

3 Service Oriented Architecture Security Risks and their Mitigation Executive Summary Service Oriented Architecture (SOA) is an architectural style and its aim is to achieve a loose coupling amongst interacting components in a distributed system. SOA is designed to assist developers in building applications that interoperate and run seamlessly over heterogeneous environments deployed over multiple platforms. SOA is expected to provide benefits such as cost savings to organisations by increasing the speed of implementation of application(s) and reducing the expenditure on integration technologies [1]. However, security is one of the main roadblocks delaying deployment of SOA in organisations [2]. Computer systems and in particular distributed systems face several security risks which also affect a SOA. In this report, we introduce some of the security threats faced by computer systems and the six security services required to counteract such threats in Section 2. The relationship between the layers of distributed systems (SOA is a type of middleware and is one of the layers) and the six security services is shown in Section 3. In Section 4, we discuss a range of security vulnerabilities faced by SOA. They include classical system vulnerabilities, Web application vulnerabilities and vulnerabilities specifically affecting SOA itself. Section 5 introduces some of the security standards created to mitigate SOA security vulnerabilities. In Section 6, we list some of the security products created to counter the threats faced by SOA. Finally, Section 7 concludes this report with some remarks.

4 This page is intentionally blank

5 DSTO-TN-1126 Content ACRONYMS 1. INTRODUCTION COMPUTER SYSTEMS SECURITY DISTRIBUTED SYSTEMS SECURITY SOA SECURITY VULNERABILITIES Classical vulnerabilities Web application vulnerabilities Injection attack Cross-site scripting (XSS) attack Cross Site Request Forgery (CSRF) Vulnerabilities in protocols and session management Security misconfiguration Insecure cryptographic storage Username enumeration SOA-specific vulnerabilities Web Services Layer Business Processes Layer SOA-specific technology vulnerabilities impacting all layers of SOA SOA SECURITY STANDARDS WS-Security and related standards SOA SECURITY PRODUCTS XML APPLIANCES AND SOA SOLUTIONS Layer IBM Intel Cisco Forum Vordel CA CONCLUSION REFERENCES... 20

6 DSTO-TN-1126 This page is intentionally blank

7 DSTO-TN-1126 Acronyms AVDL BPEL COM CORBA COTS CPU CRL CSRF DOM DOP DoS DTD ESB FIPS HSM HTTP IP IPSec LDAP MIME NRL NSA NVD OASIS OSVDB OWASP P3P PKI SAML SAX SLA SOA SQL SSL SSO TCP TLS URL US-CERT W3C WS WS-BPEL WSDL XACL Application Vulnerability Description Language Business Process Execution Language Component Object Model Common Object Request Broker Architecture Commercial Off The Shelf Central Processing Unit Certificate Revocation List Cross Site Request Forgery Document Object Model Defence Operations Platform Denial of Service Document Type Definition Enterprise Service Bus Federal Information Processing Standard Hardware Security Module Hypertext Transfer Protocol Internet Protocol Internet Protocol Security Lightweight Directory Access Protocol Multipurpose Internet Mail Extensions Naval Research Laboratory National Security Agency National Vulnerability Database Organisation for the Advancement of Structured Information Standards Open Source Vulnerability Database Open Web Applications Security Project Platform for Privacy Preferences Public Key Infrastructure Security Assertions Markup Language Simple API for XML Service Level Agreement Service Oriented Architecture Structured Query Language Secure Sockets Layer Single Sign On Transmission Control Protocol Transport Layer Security Uniform Resource Locator United States Computer Emergency Readiness Team World Wide Web Consortium Web Service(s) Web Services Business Process Execution Language Web Services Description Language XML Access Control Language

8 DSTO-TN-1126 XACML XEE XKMS XML XSS extensible Access Control Markup Language XML External Entity XML Key Management Specification extensible Markup Language Cross Site Scripting

9 DSTO-TN Introduction A Service Oriented Architecture (SOA) is expected to provide benefits such as cost savings to organisations by increasing the speed of implementation of application(s) and reducing the expenditure on integration technologies [1]. However, security is one of the main roadblocks delaying deployment of SOA in organisations [2]. Computer systems and in particular distributed systems face several security risks which also affect a SOA. In this report, we introduce some of the security threats faced by computer systems and the six security services required to counteract such threats in Section 2. The relationship between the layers of distributed systems (SOA is a type of middleware and is one of the layers) and the six security services is shown in Section 3. In Section 4, we discuss a range of security vulnerabilities faced by SOA. They include classical system vulnerabilities, Web application vulnerabilities and vulnerabilities specifically affecting SOA itself. Section 5 introduces some of the security standards created to mitigate SOA security vulnerabilities. In Section 6, we list some of the security products created to counter the threats faced by SOA. Finally, Section 7 concludes this report with some remarks. 2. Computer Systems Security At a systems level, computer systems security is about protecting the information stored in various devices and achieving a secure transfer of information over networked devices. It pertains to the protection of data against security threats. Security threats can be divided into passive and active attacks. Passive attacks are attacks that do not change the content of the data. They usually only monitor the data and are concerned with eavesdropping and accessing unauthorised data, and perhaps even disclosing it to others. Active attacks, on the other hand, actually change the content of the unauthorised accessed data. They make some modifications to the data or some new false data may be introduced to the existing data. Passive attacks are usually harder to detect than active attacks with the emphasis being on prevention rather than detection. Active attacks can be further subdivided into several categories namely masquerade, replay, unauthorised access and use of data/resources, unauthorised alteration of data/resources, repudiation of actions and unauthorised denial of service. Masquerade, as the name suggests, is the pretence of one entity to be another to gain access to some data or resources. Replay is the passive capture of data and its subsequent reuse to produce an unauthorised effect. Unauthorised access, as the name suggests, is an illegal action that leads to the use of any resources such as files, application programs, computer memory, operating systems and databases. The unauthorised alteration of data implies some or all parts of legitimate and correct data are illegitimately modified or removed illegally, or the insertion or fabrication of completely new incorrect data. The repudiation of actions occurs when a party denies that it has performed that action, even though it has; it is the threat pertaining to accountability. An 1

10 DSTO-TN-1126 unauthorised denial of service occurs when one party denies access to resources (such as a website) to entities that are otherwise authorised to use them. A range of security services is available for computer systems, which can be leveraged to counteract the threats imposed by these types of attacks. An Authorisation or access control service limits and controls access to data or resources. The authorisation service controls access by the subjects to the resources based on access control policies. Access control policies can be expressed as access control lists, capability tickets or security labels. An Authentication service identifies an entity attempting to access a system. This service ensures that the originator of a request is the rightful originator and is not an impostor masquerading as the originator. An authentication service may employ a simple mechanism such as a user identity and password scheme or more sophisticated key based mechanisms such as such as Kerberos [3] (based on symmetric keys) or X.509 [4] (based on public keys) to authenticate the users. A Confidentiality service protects against the unauthorised disclosure of data or resources. The service employs cryptographic mechanisms to protect against unauthorised disclosure of information. An Integrity service protects against the unauthorised alteration of data or resources. The service employs cryptographic protocols and chaining techniques such as message authentication codes and hash functions to counteract such threats. A Non-repudiation service protects against the repudiation of actions. The service relies on a trusted third party for the arbitration of disputes. It provides the proof that certain action has taken place. It can protect the originator of data against false denial by the recipient as well as a recipient against the false denial by the originator. A non-repudiation service must be in place prior to the information transfer. Digital signatures are used as a common mechanism to achieve non-repudiation. An Auditing service, although not directly involved in the prevention of security violations assists in their detection. It tests the adequacy of the other security services in place and the conformance of the system to the security policy. Common mechanisms include the definition of the security-related events to be audited, the definition of the audit record, and the definition and generation of security alarms and actions. Also, audit trails can be stored and analysed at regular intervals. It is important to note that auditing services themselves require confidentiality, integrity and authentication services for their protection. Security Policy Management: All the security services described above have related security information such as keys, rules or policies. Depending on the type of security service, security authorities can be defined which are responsible for managing such security information. It is important to note that the security management functions themselves should be secured from the types of threats discussed above. 2

11 DSTO-TN Distributed Systems Security Figure 1 shows the marriage between security services and distributed systems and is referred to as the UT model in [5], because it resembles the shape of the alphabet letters U and T. The legs of the U are an abstract representation of a distributed system. The six security services and their management are represented by the T. Distributed systems assume an underlying fully functional network. Every node in a distributed system runs essentially on a piece of hardware. On top of the hardware sits an operating system, which in turn is a platform for deploying middleware and for running multiple applications. Finally, users make use of various types of applications to perform a number of tasks. In general, all the six security services may be required across the layers of a distributed system. The UT model is used to highlight the various design choices and trade offs in determining whether, where and how security services should be designed and integrated into a distributed system. Figure 1. UT Model (adopted from [6]) Figure 2 extends the UT model to include business market segments such as finance, medical, defence and telecommunications [5]. It conveys the need to take into account specific characteristics and requirements for security services for various business segments. Hence, in the design of a secure distributed system, it is necessary not only to address the technical security requirements but also the business needs of the various applications. With respect to the UT model, the middleware we consider in this report is SOA. Over the recent years, SOA attracted considerable industry attention because of the benefits it offers such as allowing interoperability over a heterogeneous environment and integration of legacy applications, amongst others [1]. SOA can be used to build new solutions leveraging services, to integrate existing applications or to cleave apart existing applications. Although SOA offers several benefits, security is one of the main roadblocks for enterprises, delaying the development and deployment of their services [2]. 3

12 DSTO-TN-1126 Figure 2. UT Model with vertical segments (adopted from [6]) In the next sections, we discuss some of the most common security threats faced by SOA systems. We then discuss some mitigation strategies to counter those threats. Before we move on, we would like to draw the reader s attention to the following note: It is important to note that while SOA and Web services are usually thought to be synonymous, technically they are not. Web services technology is an important tool and one implementation mechanism of SOA. However, there may be other implementation mechanisms that are more suitable in any given use case. For instance, [7] claims that: Web services technologies are not necessarily the best choice for implementing SOAs if the necessary infrastructure and expertise are in place to use COM (Component Object Model) or CORBA (Common Object Request Broker Architecture) as the implementation technology and there is no requirement for platform neutrality, using SOAP[8]/WSDL[9] 1 may not add enough benefits to justify their costs in performance. Note: From this point onwards in this report, when we use the term SOA, we implicitly mean SOA implemented using the Web Services technology. Our focus is on the Web services technology because it is the industry standard to implement SOA. Also Defence has been approved to use the Defence Operations Platform (DOP), a SOA based on the Web services technology. 4. SOA Security Vulnerabilities As discussed in Section 3, SOA is a type of middleware. It is affected by classical security vulnerabilities affecting hardware, operating systems, and in turn any software built using the operating systems (see Figure 3). SOA 2 is also affected by Web application vulnerabilities as it is commonly built on top of (thus leveraging) the Web protocols. We also have a new class of 1 SOAP and WSDL are Web services technologies. 2 Please note that SOA/Web services technologies can also be used to build Web applications. We distinguish Web services from Web applications in this report in order to explicitly discuss security vulnerabilites in Web services technologies. 4

13 DSTO-TN-1126 vulnerabilities specifically affecting an SOA, which arise due to the nature of SOA design, and new protocols and message formats supporting an SOA. The grey layers in Figure 3 correspond to SOA. Business Processes Layer Vulnerabilities Web Services Layer Vulnerabilities Web Application Vulnerabilities Classical Vulnerabilities in Hardware, Operating Systems and Software Figure 3: Vulnerabilities affecting SOA 4.1 Classical vulnerabilities Classical security vulnerabilities are those that can be exploited without using more recent Web technologies. An example is buffer overflows [10]. Such vulnerabilities are listed and updated in the U.S. National Vulnerability Database (NVD) 3 using a standard. The standard allows for automated vulnerability management, security measurement, and compliance. There are also other sources that list classical vulnerabilities such as The Open Source Vulnerability Database (OSVDB) 4, US-CERT Vulnerability Notes Database 5, MITRE Common Vulnerabilities and Exposure 6, and SecurityFocus 7. Research studies on classical vulnerabilities include the RISOS study [11] (vulnerabilities in Operation Systems), the classifications by Aslam et al. [12], Krsul [13], Tsipenyuk et al. [14] and the Naval Research Laboratory (NRL) taxonomy [15]. Other sources of vulnerability classification include books written by Thompson et al. [16] and Howard et al. [17]. As SOA leverages existing operating system, software and hardware infrastructure, the security vulnerabilities listed in the sources mentioned above are in general applicable to SOA. Therefore, suitable mitigation strategies must be applied. 4.2 Web application vulnerabilities Web application vulnerabilities occur both at the middleware and application levels (see Figure 2). The Web Application Security Consortium 8 created the Web Security Threat Classification [18] which clarifies and organises Web applications vulnerabilities, and develops and promotes an industry standard terminology for describing those vulnerabilities. Similarly, the Open Web Applications Security Project (OWASP) 9 maintains and classifies some of the most critical Web application vulnerabilities. The Application Vulnerability Description Language (AVDL) [19], proposed by the OASIS AVDL TC, is a comprehensive

14 DSTO-TN-1126 language based on XML that can be used to communicate about specific Web application security vulnerabilities, techniques that were used for discovering those vulnerabilities, and finally security measures to mitigate the corresponding threats. We introduce some of the common Web application security vulnerabilities affecting SOA such as cross-site scripting (XSS) and injection attacks. As SOA leverages and is built on top of Web technologies, vulnerabilities associated with such technologies also affect SOA. Therefore, appropriate mitigation strategies must be applied Injection attack Vulnerabilities (bugs) in software can be exploited by means of injecting code into such software in order to change the course of its execution. Code injection attacks in the case of Web applications typically involve SQL statements or scripting language code such as PHP or ASP. SQL injection attacks involve the insertion of malicious code into SQL statements to return inappropriate data, to produce an error which reveals database access information, or even worse to delete a table in the database. To counter an SQL injection attack, it is important to ensure that any SQL statements received from users are verified by means of appropriate threat-detection rules before executing those statements Cross-site scripting (XSS) attack XSS attacks [20] are a special case of code injection. Such attacks occur when a malicious client-side script is injected into Web pages viewed by other users. XSS attacks are of three broad types: 1) Reflected or non-persistent XSS attack is the most common type. In such an attack the injected code is reflected off the Web server as a response when a client sends a request such as a search string or any other input. The injected code is sent to the Web server when the client clicks on a malicious link (that includes the malicious code) on a Web page or in their . The reflected code is executed on the client s browser as it appears to be coming from a legitimate Web server, thus causing an attack to occur. 2) Stored or persistent XSS attack occurs when the malicious code is permanently stored on an affected Web server. It can be stored in a database, in a message forum or blog, for example. When a client accesses such information sources, the malicious code is executed in their browser thus causing a XSS attack to occur. 3) DOM-based attacks are different to the other two attacks in the sense that these attacks occur by exploiting client-side code directly. The Document Object Model (DOM) [21] is used by client-side scripting languages such as JavaScript to manipulate XML content. Vulnerabilities in DOM can be exploited to manipulate the XML content when it is processed on the client-side before displaying it to the client. One way to mitigate XSS attacks is to validate input fields from Web pages. Another approach is to disable client-side scripts from running. Some Web applications are designed to operate without the need for client-side scripts. The users of such Web applications are not susceptible 6

15 DSTO-TN-1126 to XSS attacks when client-side scripting is disabled. However, client-side scripting enhances user experience due to its speed (being client-side, the script runs immediately without having to contact the Web server) and also reduces the load on the Web server. Therefore, not all Web applications can do without client-side scripting Cross Site Request Forgery (CSRF) CSRF attacks [22] are the opposite of the XSS attacks. In the case of XSS attacks, a client s browser is affected because it trusts the information coming from a Web server. Whereas in the case of a CSRF attack, it is the Web server believing that the client is genuine and authenticated. Therefore, it trusts the information coming from the client and processes it. However, if the client is malicious or if it has been infected with malicious code, the Web server is susceptible to CSRF attacks. One method to mitigate CSRF attacks is having the client authenticate each time they perform a high priority operation or an operation with security implications. Another method is to use cryptographically generated random tokens that are synchronised between the client s browser and the server. If the client is infected with malicious code, a CSRF attack message generated by the malicious code will not have a valid token. This allows the Web server to reject the attack message. The OWASP CSRF guard 10 project proposes a synchronised token method to mitigate CSRF attacks Vulnerabilities in protocols and session management Flaws used in authentication protocols may be exploited to capture authentication credentials and gain unauthorised access. If a Web site does not use appropriate transport layer security such as SSL/TLS [23], then the authentication credentials sent in plain text may be captured by rogue users/organisations and misused. Similarly, attacks can occur if Session IDs are visible to illegitimate users and if session timeouts are not properly set. Therefore, appropriate transport and application layer security protocols must be used. If any flaws are observed in those protocols, they must be immediately addressed. The lifetime of sessions must be appropriately set Security misconfiguration If a Web site s security is not configured correctly, an attacker may exploit such a vulnerability to gain unauthorised access. For instance, if parts of a Web site are not protected by a security policy, an intruder may upload malware into that area of the Web site and potentially cause complete system compromise. Failure to restrict URL access to privileged parts of a Web site means unauthorised users may be able to access sensitive information such as configuration files and user passwords. Therefore, it is very important that Web applications make use of appropriate security management tools and well-trained security administrators who are able to configure and manage the Web applications security appropriately

16 DSTO-TN Insecure cryptographic storage If sensitive data stored at a Web site is encrypted using poor or home grown algorithms or even worse not encrypted at all, it may lead to breach of data confidentiality in case of an attack on the Web site. The use of weak hashes to protect passwords is another common flaw. Web site security administrators are recommended to employ strong encryption and hash algorithms in order to make sure such vulnerabilities do not arise Username enumeration An attacker may use a username enumeration script to query a database to determine if a supplied list of usernames is valid or not, thus enabling the attacker to experiment with different usernames. Once a valid username is found, the attacker can try widely used passwords (for test purposes) such as test, admin and password to gain illegitimate access. Such attacks can be mitigated by displaying error messages to such username enumeration scripts that prevent disclosure of valid usernames. Also a timed block out (for one hour or more depending on the sensitivity of the Web application) may be used if a client, for instance, is unable to provide correct authentication credentials n times in a row 11. Finally, making sure all the trivial username/password combinations created for testing purposes are deleted before the application is deployed online mitigates such attacks. 4.3 SOA-specific vulnerabilities We now discuss some of the security vulnerabilities associated with the Web services and business processes layers of SOA, and their related technologies Web Services Layer WSDL scanning A Web service s WSDL statement advertises its operations, parameters and network bindings. Some of these (internal) operations are to be used only by the service provider, for example, administrative operations. The rest of the operations (external operations) may be invoked by any service consumer. As a Web service s end point is available in its WSDL statement, an attacker can try to guess its internal operation s name and invoke it via the endpoint. Such an attack is called WSDL scanning [24]. WSDL scanning can be mitigated by using appropriate access control mechanisms such as employing an XML firewall (more information follows in Section 6) on the internal operations or by deploying internal operations to private Web services and hosting them on internal Web servers Metadata spoofing An attacker may modify Web service-related metadata such as a WSDL statement or associated WS-Security [25] policy. For instance, the Web service s endpoint may be modified for the attacker to establish a man-in-the-middle attack for eavesdropping or even worse 11 For instance, n can be equal to 3. 8

17 DSTO-TN-1126 modification of Web service data [24]. In order to mitigate such attacks service consumers must carefully verify the authenticity of Web service metadata. However, one must note that there are no standard mechanisms to verify metadata authenticity Attack obfuscation XML Encryption [26] and XML Signature [27] standards are used to provide for encryption and digital signature services for Web service messages (such as SOAP). Such encryption technologies may be used by an attacker to conceal malicious code which executes on decryption. To mitigate attack obfuscation [24], the schema of encrypted content must be validated for safety after decryption rather than before decryption. However, this can be performance intensive as it involves XML and cryptographic processing. Therefore, stepwise decryption and validation is recommended in [24] to minimise performance impact. If an attack is found after decrypting a part of the message, the message can then be discarded as soon as the attack is found, thus avoiding processing the entire message Oversized cryptography The WS-Security standard does not enforce restrictions on what parts of a security header in a SOAP message can be encrypted or even on the size of an encrypted message. This means an attacker is able to cause a denial of service by sending very large encrypted junk security headers to a Web service. Such messages cause a high load on the CPU of the Web server hosting the service as it is tries to decrypt those messages, in turn creating availability issues. Another variation on this attack is to send an oversized security header using chained encryption keys as discussed in [24]. Such an attack leads to extremely high consumption of memory and CPU. Oversize cryptography attacks can be mitigated by having the service consumer conform very strictly to the Web service s security policy (as stated using WS- Security Policy [28] standard). For instance, a service consumer s request may only be processed if the security header elements in the incoming SOAP message exactly match the security policy s schema requirements Business Processes Layer BPEL scanning A business process s WS-BPEL (BPEL) [29] statement may be subjected to a BPEL scanning attack similar to the WSDL scanning attack described earlier. Mitigation strategies similar to the WSDL scanning attack described above may be applied Metadata spoofing Metadata spoofing described earlier (for Web services) is also applicable to the business processes. For instance, an attacker may modify a business process s endpoint references in its BPEL statement. Mitigation strategies similar to those for the metadata spoofing attack described above for the Web services layer may be applied BPEL state deviation A BPEL engine may have many process instances running at the same time and communication endpoints open at all times to receive incoming messages. An attacker can flood an engine on those endpoints with many BPEL messages that conform to the schema but have no meaningful content [24]. The computational resources of the BPEL engine quickly 9

18 DSTO-TN-1126 become exhausted if such an attack happens. In order to mitigate such attacks, as few computational resources as possible should be used to reject such invalid messages. One such approach (firewall-based) is proposed in [30] Instantiation flooding (direct and indirect) BPEL engines instantiate a new process when they receive an incoming receive message. When a receive message is received a BPEL engine pauses its current execution. It continues execution only after the incoming message is fully received. An attacker may exploit this feature of BPEL engines by repeatedly sending invalid receive messages. Such messages severely affect the BPEL engine by decreasing or even nullifying its availability to legitimate messages. Indirect flooding of BPEL engines is also possible when the attack target differs. For instance, an attacker can use an instantiated process on one BPEL engine to cause a flooding attack on another BPEL engine. This is possible if the attacker invokes a business process on the first BPEL engine that interacts with another Web service or business process on the second BPEL engine. Several variations of instantiation flooding attacks are discussed in [24]. Protecting BPEL engines against flooding attacks is not trivial as in many cases incoming messages need to be semantically analysed before discarding invalid messages. Also the semantics of a business process are not disclosed in its process description (BPEL statement) WS-Addressing spoofing The WS-Addressing [31] specification discusses how to address Web service and business process endpoints in a standard way. An attacker can modify endpoint references used in WS- Addressing headers to point a BPEL engine to invalid or malicious services or processes [24]. This attack can be compounded if used as a flooding attack maximising the workload produced by each attack message on a BPEL engine. Address spoofing can be mitigated by verifying the validity of endpoint URLs before the process is executed by the BPEL engine. Please note that this attack also applies to the Web services layer of SOA Workflow engine hijacking In this attack, address spoofing is used once again to flood a target system [24]. The difference is that the attacker s endpoint is a legitimate service (the target of the attack). The problem with identifying this attack is that sometimes the messages may even be genuine. For example, a credit card payment service used by an online gift shop may be flooded with messages at the time of the Boxing Day sale every year; the messages maybe legitimate (genuine purchases) and not an attack on the service. This means the target system tries hard to process the attack messages (in turn breaking down) and its legitimate users suffer a denial of service. The attacker leverages the processing power of the source system to tear down the target system. Workflow engine hijacking can be mitigated by verifying the validity of endpoint URLs before the process is executed by the BPEL engine SOA-specific technology vulnerabilities impacting all layers of SOA SOAP vulnerabilities Harmful SOAP attachments SOAP messages may contain attachments of arbitrary size. An attacker may attach a virus to a SOAP message and send it for processing to the target system. Or the attacker may send very 10

19 DSTO-TN-1126 large encrypted attachments that are of absolutely no value to the target system. Such attachments are difficult to process and may cause denial of service. To mitigate such attacks, SOAP attachments may be blocked in some cases. In other cases where attachments are necessary, they may either be filtered based on a MIME-type or passed through a firewall or an anti-virus solution [32] SOAPAction spoofing In this attack, an attacker modifies the SOAPAction element in a HTTP header in order to execute an action that is not predefined by the Web service provider. Such attacks can either be executed by the client directly or by an intruder (man in the middle). Examples of such attacks are discussed in [24]. SOAPAction spoofing attacks can be mitigated by strictly verifying if the action in the SOAP body matches the action in the HTTP header [24]. If they do not match, the incoming message should be rejected XML vulnerabilities XML External Entity (XEE) attack The XML specification allows for external data to be included into XML using URIs dynamically at the time of processing XML [32]. An attacker can take advantage of this fact and replace the data or information being collected from the URI with malicious code. In order to mitigate XEE attacks, an XML parser should strictly prohibit all external entities in untrusted XML XPath injection The XPath [33] specification is used to navigate the content of an XML document. An Xpath injection attack (similar to SQL injection attack) is possible and can be used to inject an XPath expression and access unauthorised information from an XML database. Such an attack can be mitigated by making sure that an XPath expression itself does not contain another XPath expression [32] XML Denial of Service (DoS) attacks DoS attacks are caused due to resource exhaustion (processor, memory, or network bandwidth) at the server hosting a Web service or a business process. We discuss some of the DoS attacks associated with XML here. XML consumes large amounts of memory for it to be parsed and processed. The Document Object Model (DOM) [21] approach for parsing and processing XML consumes a very large amount of memory. This is because an in-memory object representation of the entire XML document, that requires much more memory space than the XML document itself, is required. In [24], the authors observed a rise in memory consumption by a factor of 2 to 30 in commonly used Web service frameworks when using DOM over another model for XML parsing the Simple API for XML (SAX) [34]. Therefore, an oversize XML payload in a SOAP message can be used to easily cause a DoS attack. One way to counter an oversize payload attack is to limit the size of incoming SOAP messages. An attacker can exploit certain features of XML to cause DoS using coercive parsing [35]. For instance, XML can become verbose and complex in parsing when using namespaces. An 11

20 DSTO-TN-1126 example attack is discussed in [24]. Coercive parsing attacks based on complex or deeply nested documents can be mitigated using schema validation against the service s WSDL before fully parsing the incoming message. However, attacks based on misusing namespace declarations are harder to prevent as the XML specification does not place restrictions on the way namespaces are defined. An attacker can exploit a feature of Document Type Definitions (DTDs) that enables them to pull in entities which are defined in a DTD. By pulling in entities recursively, an attacker can create an XML message which explodes in memory and causes a DoS attack [32]. Such an attack can be mitigated by limiting the size of XML payloads in incoming SOAP messages. A useful feature of XML is nesting of elements. However, this feature can be used to stress and break an XML parser by sending a SOAP message with XML content that is for instance a thousand or more elements deep, thus causing a DoS attack [35]. Such an attack can be mitigated by limiting the size of incoming SOAP messages. Completely valid XML messages can be used to cause a DoS attack called replay attack in [35]. An attacker can send repetitive SOAP messages carrying XML payloads that are valid and the requests are well formed. However, the intention to send those messages is malicious (to cause a DoS attack) and attacker does not have a business reason to send those messages. Such attacks can be thwarted by using unique session tokens in SOAP messages such as nonces (unique numbers used only once) Schema poisoning Schema poisoning involves modifying the XML schema information to attack a target system. An attacker may intercept an XML schema before it reaches a client (from a server) and modify it. Schema poisoning may cause a DoS attack as the XML parser may hang or reach an inconsistent state as it does not have relevant schema information for parsing the XML document. Minor modifications of the schema (such as modifying data types) may mean an inaccurate response is sent to the client. Schema poisoning attacks can be thwarted by protecting XML schemas against unauthorised modification [36]. Many of the threats described in this section can be mitigated by making use of suitable authentication, confidentiality, integrity, and authorisation standards such as Security Assertion Markup Language (SAML) [37], WS-Security [25] and extensible Access Control Markup Language (XACML) [38], and Commercial of the Shelf (COTS) solutions such as IBM Tivoli Identity Manager (TIM) [39], IBM Tivoli Access Manager (TAM) [40] and CA SOA Security Manager [41] for authentication and for authorisation. Machines/non-human users should be clearly identified and authenticated by the identity provision and authentication services. Although IBM TIM (part of the Defence Operations Platform (DOP)) offers an authentication service, it does not offer federated authentication to external service providers. Similarly, IBM TAM (part of the DOP) does not offer a distributed authorisation service. For example, when a composite Web service is invoked, an external service provider s service may be invoked. In 12

21 DSTO-TN-1126 such a scenario, a device (the DataPower 12 appliance) authenticates itself to the external service provider in order to gain access to the service. However, in many such cases, the external service provider requires end-user authorisation, and not just the device authorisation. As far as we know, this end-user authorisation to external service providers is not currently possible within the DOP. Indrakanti et al. [42-44] proposed a comprehensive authorisation framework for SOA, which offers end-user authorisation to external service providers. The authorisation framework also addresses other design requirements proposed in [45-47]. Suitable auditing and non-repudiation services provided by COTS tools such as IBM Tivoli Compliance Insight Manager [48] can be leveraged. Message level security (confidentiality and integrity) must be provisioned by using an appropriate gateway (such as CISCO ACE XML Gateway [49] or Sentry XML Gateway [50]) and/or middleware product such as an ESB implementing suitable standards such as WS-Security, XML Encryption [26] and XML Signature [27]. Also SOA-specific technology threats (such as XML threats and SOAP threats) must be mitigated using appropriate tools and solutions described in Section 6. In Sections 5 and 6, we describe some suitable SOA threat mitigation strategies by means of SOA security standards and their implementation in COTS solutions. 5. SOA Security Standards There have been several efforts striving to provide SOA security standards for authentication, confidentiality and integrity amongst others. We introduce some of the relevant SOA security standards here. XML Signature [27] XML Signature is a foundational technology for the WS-Security [25] specification and for Web services security in general. It is core to the WS-Security, XML Key Management Specification (XKMS) [51] and other Web services security standards. It is also useful for transporting shared secret keys that are needed by XML Encryption [26]. XML Signature enables the encoding of digital signatures into XML. The XML Signature Syntax and Processing W3C Recommendation defines the XML signature syntax and associated processing rules. XML Encryption [26] Similar to XML Signature, XML Encryption is built using shared-key encryption technology, and is a W3C recommendation. The core requirements for XML Encryption are that it must be able to encrypt an arbitrarily sized XML message and it must do so efficiently. The reason XML Encryption is required over and above transport-level encryption such as SSL is that message confidentiality should be maintained when a message takes multiple hops on its way to its destination. This will be common when shared services are used. XML Encryption also preserves message confidentiality when an XML message is

22 DSTO-TN-1126 stored even after it reaches its final destination. XML Encryption applies standard algorithms to data and then stores that encrypted result in XML. XML Key Management Specification [51] The XML Key Management Specification (XKMS) is built on top of and complements the XML standards for digital signature and encryption. XML signature and XML encryption technologies scale best when they use public key cryptography. Public key cryptography requires a supporting Public Key Infrastructure (PKI) [52, pp ] to handle distribution, certification and life-cycle management (for example, the revocation) of keys. Web services themselves provide a different approach by enabling the PKI to be accessed as a service; hence, there is no need for each Web service requestor and provider to build their own PKI. XKMS aims to do just that. It specifies protocols for distributing and registering public keys suitable for use in conjunction with the XML Signature and the XML Encryption standards. SAML Security Assertion Markup Language (SAML) [37] proposed by the OASIS Security Services Technical Committee, is an XML-based security specification for exchanging authentication and authorisation information about a user or subject. It defines an XML schema and definition for security assertions. The assertions are of three types authentication, any security related attributes for the subject, and the authorisation decisions given based on the security and privilege attributes. SAML can also be extended to send any arbitrary security assertions. This shows that SAML is primarily used to carry security and privilege attributes related to a subject from one entity to another entity in a network. The only requirement is that both the entities comply with the SAML standard. XACML EXtensible Access Control Markup Language (XACML) [38] is an XML-based policy language for access control that has been standardised by OASIS. XACML describes both an access control policy language and leverages an SAML profile for XACML for request/response messages. The SAML-profile for XACML can be used to express queries about whether a particular access should be allowed (requests), and also to describe answers to those queries (responses). The XACML policy language is heavily based on the XACL [53] policy language, but uses more generic terminology. An XACML policy specification is composed of one or more rule, policy, and policy set elements. A rule is the most elementary unit of policy. Rules must be encapsulated in a policy for them to be exchanged between entities. A rule is composed of a target, an effect, and a condition. 5.1 WS-Security and related standards In April 2002, IBM and Microsoft published a joint whitepaper called Security in a Web Services World: A Proposed Architecture and Roadmap [54]. This whitepaper describes a set of security standards and technologies meant to create a unifying approach for dealing with security in a Web services world. Just as WS-Security allows security mechanisms such as Public Key Infrastructure (PKI) and SAML to participate in Web services security, the Web Services Architecture Roadmap generalises many of the security functions that previously existed in other domains and proposes a framework for meeting the security requirements of the Web services domain. The proponents of this framework and the standards bodies they are working through are accomplishing this by first rolling out foundational specifications 14

23 DSTO-TN-1126 such as WS-Security (which, in turn, was built on XML Signature, XML Encryption, SAML and other security-token standards) and then developing other standards that rely on these foundational standards. WS-Security [25] Describes extensions to SOAP for secure messaging. It is a generalpurpose mechanism for associating security tokens with SOAP messages. WS-Security builds on and is fully compatible with established and mature security technologies such as SSL, IPSec 13, XML Signature and XML Encryption. It is designed to address message integrity, message confidentiality, message authentication and the encoding of security tokens that travel with the messages being secured. WS-Policy [55] Defines how to express the capabilities and constraints of security policy. WS-Policy allows organisations exposing Web services to specify the requirements of their Web services for issues such as privacy or security. The WS-Policy is a high-level specification providing the basic constructs required to compose a particular policy language (such as WS- SecurityPolicy [28]). Closely related to the WS-Policy specification is the WS-PolicyAssertions [56] specification, which provides some basic policy assertions that would apply to any type of policy, and the WS-PolicyAttachment [57] specification, which gives guidance on how to attach a policy to a resource. The WS-SecurityPolicy is a specific type of policy using the WS- Policy framework that answers certain security requirement and configuration questions for a Web service, such as the types of encryption algorithms that are to be supported, the parameters that are to be encrypted and the types of security tokens that are to be specified. WS-Trust [58] Describes the model for establishing both direct and brokered trust relationships including intermediaries. The Web Services Trust Language (WS-Trust) uses the secure messaging mechanisms of WS-Security to define additional primitives and extensions for the issuance, exchange and validation of security tokens. WS-Trust also enables the issuance and dissemination of credentials within different trust domains. To secure a communication between two parties, the two parties must exchange security credentials (either directly or indirectly). However, each party needs to determine if they can trust the asserted credentials of the other party. This specification defines extensions to WS-Security for issuing and exchanging security tokens and ways to establish and access the presence of trust relationships. Using these extensions, applications can engage in secure communication designed to work with the general Web services architecture. WS-Privacy This specification will enable users to state privacy preferences and Web services to state and implement privacy practices. At the time of writing this report, there is no WS-Privacy standard available. The Platform for Privacy Preferences (P3P) [59] project defines a protocol that allows websites to specify how they intend to use private information of users. The protocol allows users to make an informed decision with respect to privacy; whether or not to use a website. The P3P standard maybe leveraged and perhaps enhanced to specify and enforce the privacy preferences of Web services users. WS-SecureConversation [60] Describes how to manage and authenticate message exchanges between parties, including exchanging security contexts and establishing and 13 Internet Protocol Security. Provides end-to-end security in the internet layer of the TCP/IP suite. 15

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that

More information

WEB SERVICES SECURITY

WEB SERVICES SECURITY WEB SERVICES SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without

More information

Last update: February 23, 2004

Last update: February 23, 2004 Last update: February 23, 2004 Web Security Glossary The Web Security Glossary is an alphabetical index of terms and terminology relating to web application security. The purpose of the Glossary is to

More information

This Working Paper provides an introduction to the web services security standards.

This Working Paper provides an introduction to the web services security standards. International Civil Aviation Organization ATNICG WG/8-WP/12 AERONAUTICAL TELECOMMUNICATION NETWORK IMPLEMENTATION COORDINATION GROUP EIGHTH WORKING GROUP MEETING (ATNICG WG/8) Christchurch New Zealand

More information

NIST s Guide to Secure Web Services

NIST s Guide to Secure Web Services NIST s Guide to Secure Web Services Presented by Gaspar Modelo-Howard and Ratsameetip Wita Secure and Dependable Web Services National Institute of Standards and Technology. Special Publication 800-95:

More information

What is Web Security? Motivation

What is Web Security? Motivation brucker@inf.ethz.ch http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web

More information

elearning for Secure Application Development

elearning for Secure Application Development elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

Strategic Information Security. Attacking and Defending Web Services

Strategic Information Security. Attacking and Defending Web Services Security PS Strategic Information Security. Attacking and Defending Web Services Presented By: David W. Green, CISSP dgreen@securityps.com Introduction About Security PS Application Security Assessments

More information

Web Services Security with SOAP Security Proxies

Web Services Security with SOAP Security Proxies Web Services Security with Security Proxies Gerald Brose, PhD Technical Product Manager Xtradyne Technologies AG OMG Web Services Workshop USA 22 April 2003, Philadelphia Web Services Security Risks! Exposure

More information

Den Gode Webservice - Security Analysis

Den Gode Webservice - Security Analysis Den Gode Webservice - Security Analysis Cryptomathic A/S September, 2006 Executive Summary This report analyses the security mechanisms provided in Den Gode Web Service (DGWS). DGWS provides a framework

More information

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards)

Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Principles and Foundations of Web Services: An Holistic View (Technologies, Business Drivers, Models, Architectures and Standards) Michael P. Papazoglou (INFOLAB/CRISM, Tilburg University, The Netherlands)

More information

OWASP Top Ten Tools and Tactics

OWASP Top Ten Tools and Tactics OWASP Top Ten Tools and Tactics Russ McRee Copyright 2012 HolisticInfoSec.org SANSFIRE 2012 10 JULY Welcome Manager, Security Analytics for Microsoft Online Services Security & Compliance Writer (toolsmith),

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy jmacy@forumsys.com CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?

More information

Web Service Security Vulnerabilities and Threats in the Context of WS-Security

Web Service Security Vulnerabilities and Threats in the Context of WS-Security Web Service Security Vulnerabilities and Threats in the Context of WS-Security Jesper Holgersson Eva Söderström University of Skoevde, Sweden SIIT 2005, ITU, Geneva, September 2005 Outline of presentation

More information

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP) Title: Functional Category: Information Technology Services Issuing Department: Information Technology Services Code Number: xx.xxx.xx Effective Date: xx/xx/2014 1.0 PURPOSE 1.1 To appropriately manage

More information

Web Application Security

Web Application Security E-SPIN PROFESSIONAL BOOK Vulnerability Management Web Application Security ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. COMBATING THE WEB VULNERABILITY THREAT Editor s Summary

More information

Nuclear Regulatory Commission Computer Security Office Computer Security Standard

Nuclear Regulatory Commission Computer Security Office Computer Security Standard Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-1108 Web Application Standard Revision Number: 1.0 Effective Date:

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

Service Oriented Architecture

Service Oriented Architecture Service Oriented Architecture Charlie Abela Department of Artificial Intelligence charlie.abela@um.edu.mt Last Lecture Web Ontology Language Problems? CSA 3210 Service Oriented Architecture 2 Lecture Outline

More information

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document

More information

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not

More information

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration

More information

How the Barracuda Web Application Firewall Secures Your Mobile and IoT Services. Whitepaper

How the Barracuda Web Application Firewall Secures Your Mobile and IoT Services. Whitepaper How the Barracuda Web Application Firewall Secures Your Mobile and IoT Services Whitepaper Executive Summary The mobile application space has experienced an unprecedented growth in recent years, and it

More information

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper

Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks. Whitepaper Application Layer Encryption: Protecting against Application Logic and Session Theft Attacks Whitepaper The security industry has extensively focused on protecting against malicious injection attacks like

More information

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY www.alliancetechpartners.com WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY More than 70% of all websites have vulnerabilities

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008

Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication

More information

IY2760/CS3760: Part 6. IY2760: Part 6

IY2760/CS3760: Part 6. IY2760: Part 6 IY2760/CS3760: Part 6 In this part of the course we give a general introduction to network security. We introduce widely used security-specific concepts and terminology. This discussion is based primarily

More information

Challenges of Security Risks in Service-Oriented Architectures

Challenges of Security Risks in Service-Oriented Architectures UMR 5205 Challenges of Security Risks in Service-Oriented Architectures Youakim Badr 1, Frederique Biennier 1, Pascal Bou Nassar 3, Soumya Banerjee 2!! 1 LIRIS Lab, INSA-Lyon, France! 2 Agence Universitaire

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

OWASP AND APPLICATION SECURITY

OWASP AND APPLICATION SECURITY SECURING THE 3DEXPERIENCE PLATFORM OWASP AND APPLICATION SECURITY Milan Bruchter/Shutterstock.com WHITE PAPER EXECUTIVE SUMMARY As part of Dassault Systèmes efforts to counter threats of hacking, particularly

More information

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office

CSUSB Web Application Security Standard CSUSB, Information Security & Emerging Technologies Office CSUSB, Information Security & Emerging Technologies Office Last Revised: 03/17/2015 Draft REVISION CONTROL Document Title: Author: File Reference: CSUSB Web Application Security Standard Javier Torner

More information

Secure Authentication and Session. State Management for Web Services

Secure Authentication and Session. State Management for Web Services Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively

More information

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282

CICS Web Service Security. Anthony Papageorgiou IBM CICS Development March 13, 2012 Session: 10282 Web Service Security Anthony Papageorgiou IBM Development March 13, 2012 Session: 10282 Agenda Web Service Support Overview Security Basics and Terminology Pipeline Security Overview Identity Encryption

More information

Web Application Hacking (Penetration Testing) 5-day Hands-On Course

Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Web Application Hacking (Penetration Testing) 5-day Hands-On Course Course Description Our web sites are under attack on a daily basis

More information

Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008

Web Services Security: What s Required To Secure A Service-Oriented Architecture. An Oracle White Paper January 2008 Web Services Security: What s Required To Secure A Service-Oriented Architecture An Oracle White Paper January 2008 Web Services Security: What s Required To Secure A Service-Oriented Architecture. INTRODUCTION

More information

Security Digital Certificate Manager

Security Digital Certificate Manager IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,

More information

COSC 472 Network Security

COSC 472 Network Security COSC 472 Network Security Instructor: Dr. Enyue (Annie) Lu Office hours: http://faculty.salisbury.edu/~ealu/schedule.htm Office room: HS114 Email: ealu@salisbury.edu Course information: http://faculty.salisbury.edu/~ealu/cosc472/cosc472.html

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

CHAPTER - 3 WEB APPLICATION AND SECURITY

CHAPTER - 3 WEB APPLICATION AND SECURITY CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

Security Issues In Cloud Computing and Countermeasures

Security Issues In Cloud Computing and Countermeasures Security Issues In Cloud Computing and Countermeasures Shipra Dubey 1, Suman Bhajia 2 and Deepika Trivedi 3 1 Department of Computer Science, Banasthali University, Jaipur, Rajasthan / India 2 Department

More information

Sitefinity Security and Best Practices

Sitefinity Security and Best Practices Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Passing PCI Compliance How to Address the Application Security Mandates

Passing PCI Compliance How to Address the Application Security Mandates Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These

More information

Network Test Labs (NTL) Software Testing Services for igaming

Network Test Labs (NTL) Software Testing Services for igaming Network Test Labs (NTL) Software Testing Services for igaming Led by committed, young and dynamic professionals with extensive expertise and experience of independent testing services, Network Test Labs

More information

Security Goals Services

Security Goals Services 1 2 Lecture #8 2008 Freedom from danger, risk, etc.; safety. Something that secures or makes safe; protection; defense. Precautions taken to guard against crime, attack, sabotage, espionage, etc. An assurance;

More information

JVA-122. Secure Java Web Development

JVA-122. Secure Java Web Development JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard

More information

The Top Web Application Attacks: Are you vulnerable?

The Top Web Application Attacks: Are you vulnerable? QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions jburroughs@uk.ibm.com Agenda Current State of Web Application Security Understanding

More information

Securing Web Services From Encryption to a Web Service Security Infrastructure

Securing Web Services From Encryption to a Web Service Security Infrastructure Securing Web Services From Encryption to a Web Service Security Infrastructure Kerberos WS-Security X.509 TLS Gateway OWSM WS-Policy Peter Lorenzen WS-Addressing Agent SAML Policy Manager Technology Manager

More information

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6 WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications

More information

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities

CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities CSE598i - Web 2.0 Security OWASP Top 10: The Ten Most Critical Web Application Security Vulnerabilities Thomas Moyer Spring 2010 1 Web Applications What has changed with web applications? Traditional applications

More information

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION

External Vulnerability Assessment. -Technical Summary- ABC ORGANIZATION External Vulnerability Assessment -Technical Summary- Prepared for: ABC ORGANIZATI On March 9, 2008 Prepared by: AOS Security Solutions 1 of 13 Table of Contents Executive Summary... 3 Discovered Security

More information

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements

More information

Public-Key Infrastructure

Public-Key Infrastructure Public-Key Infrastructure Technology and Concepts Abstract This paper is intended to help explain general PKI technology and concepts. For the sake of orientation, it also touches on policies and standards

More information

Secure Coding SSL, SOAP and REST. Astha Singhal Product Security Engineer salesforce.com

Secure Coding SSL, SOAP and REST. Astha Singhal Product Security Engineer salesforce.com Secure Coding SSL, SOAP and REST Astha Singhal Product Security Engineer salesforce.com Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may

More information

Web application security

Web application security Web application security Sebastian Lopienski CERN Computer Security Team openlab and summer lectures 2010 (non-web question) Is this OK? int set_non_root_uid(int uid) { // making sure that uid is not 0

More information

WEB APPLICATION SECURITY

WEB APPLICATION SECURITY WEB APPLICATION SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet March 8, 2012 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development

More information

Chapter 10. Cloud Security Mechanisms

Chapter 10. Cloud Security Mechanisms Chapter 10. Cloud Security Mechanisms 10.1 Encryption 10.2 Hashing 10.3 Digital Signature 10.4 Public Key Infrastructure (PKI) 10.5 Identity and Access Management (IAM) 10.6 Single Sign-On (SSO) 10.7 Cloud-Based

More information

CMP3002 Advanced Web Technology

CMP3002 Advanced Web Technology CMP3002 Advanced Web Technology Assignment 1: Web Security Audit A web security audit on a proposed eshop website By Adam Wright Table of Contents Table of Contents... 2 Table of Tables... 2 Introduction...

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

Securely Managing and Exposing Web Services & Applications

Securely Managing and Exposing Web Services & Applications Securely Managing and Exposing Web Services & Applications Philip M Walston VP Product Management Layer 7 Technologies Layer 7 SecureSpan Products Suite of security and networking products to address the

More information

UNCLASSIFIED CPA SECURITY CHARACTERISTIC WEB APPLICATION FIREWALLS. Version 1.3. Crown Copyright 2011 All Rights Reserved

UNCLASSIFIED CPA SECURITY CHARACTERISTIC WEB APPLICATION FIREWALLS. Version 1.3. Crown Copyright 2011 All Rights Reserved 18397081 CPA SECURITY CHARACTERISTIC WEB APPLICATION FIREWALLS Version 1.3 Crown Copyright 2011 All Rights Reserved CPA Security Characteristics for Web Application Firewalls Document History [Publish

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker

PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

M2M. Machine-to-Machine Intelligence Corporation. M2M Intelligence. Architecture Overview

M2M. Machine-to-Machine Intelligence Corporation. M2M Intelligence. Architecture Overview M2M Machine-to-Machine Intelligence Corporation M2M Intelligence Architecture Overview M2M Intelligence - Essential platform for the M2M and IoT Economy Architecture Overview Revised styles and edits 6/3/2016

More information

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 WHITE PAPER FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6 Ensuring compliance for PCI DSS 6.5 and 6.6 Page 2 Overview Web applications and the elements surrounding them

More information

IJMIE Volume 2, Issue 9 ISSN: 2249-0558

IJMIE Volume 2, Issue 9 ISSN: 2249-0558 Survey on Web Application Vulnerabilities Prevention Tools Student, Nilesh Khochare* Student,Satish Chalurkar* Professor, Dr.B.B.Meshram* Abstract There are many commercial software security assurance

More information

Essential IT Security Testing

Essential IT Security Testing Essential IT Security Testing Application Security Testing for System Testers By Andrew Muller Director of Ionize Who is this guy? IT Security consultant to the stars Member of OWASP Member of IT-012-04

More information

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Barracuda Web Site Firewall Ensures PCI DSS Compliance Barracuda Web Site Firewall Ensures PCI DSS Compliance E-commerce sales are estimated to reach $259.1 billion in 2007, up from the $219.9 billion earned in 2006, according to The State of Retailing Online

More information

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012 Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret

More information

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems

A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Volume 1, Number 2, December 2014 JOURNAL OF COMPUTER SCIENCE AND SOFTWARE APPLICATION A Conceptual Technique for Modelling Security as a Service in Service Oriented Distributed Systems Satish Kumar*,

More information

Columbia University Web Security Standards and Practices. Objective and Scope

Columbia University Web Security Standards and Practices. Objective and Scope Columbia University Web Security Standards and Practices Objective and Scope Effective Date: January 2011 This Web Security Standards and Practices document establishes a baseline of security related requirements

More information

IBM. How can we support the requirement of creating dynamic, flexible and cost effective solution in the IAM area?

IBM. How can we support the requirement of creating dynamic, flexible and cost effective solution in the IAM area? IBM How can we support the requirement of creating dynamic, flexible and cost effective solution in the IAM area? Sven-Erik Vestergaard Nordic Security Architect IBM Software group svest@dk.ibm.com Security

More information

Attack Vector Detail Report Atlassian

Attack Vector Detail Report Atlassian Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015 Prepared By Report Description Notes cdavies@atlassian.com The Attack Vector Details report provides details of vulnerability

More information

Chap. 1: Introduction

Chap. 1: Introduction Chap. 1: Introduction Introduction Services, Mechanisms, and Attacks The OSI Security Architecture Cryptography 1 1 Introduction Computer Security the generic name for the collection of tools designed

More information

Digital Signature Web Service Interface

Digital Signature Web Service Interface 1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Web Services and Service Oriented Architectures. Thomas Soddemann, RZG

Web Services and Service Oriented Architectures. Thomas Soddemann, RZG Web Services and Service Oriented Architectures, RZG Delaman Workshop 2004 Overview The Garching Supercomputing Center - RZG Diving into the world of Web Services Service Oriented Architectures And beyond

More information

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter conpap@owasp.gr

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

A pattern for the WS-Trust standard for web services

A pattern for the WS-Trust standard for web services A pattern for the WS-Trust standard for web services Ola Ajaj and Eduardo B. Fernandez Department of Computer and Electrical Engineering and Computer Science Florida Atlantic University 777 Glades Road,

More information

OWASP Web Application Penetration Checklist. Version 1.1

OWASP Web Application Penetration Checklist. Version 1.1 Version 1.1 July 14, 2004 This document is released under the GNU documentation license and is Copyrighted to the OWASP Foundation. You should read and understand that license and copyright conditions.

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Certified Secure Web Application Secure Development Checklist

Certified Secure Web Application Secure Development Checklist www.certifiedsecure.com info@certifiedsecure.com Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill

More information

Common Criteria Web Application Security Scoring CCWAPSS

Common Criteria Web Application Security Scoring CCWAPSS Criteria Web Application Security Scoring CCWAPSS Author Frédéric Charpentier, security pentester. France. Fcharpentier@xmcopartners.com Releases Version 1.0 : First public release September 2007 Version

More information

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls Firewalls, Tunnels, and Network Intrusion Detection 1 Firewalls A firewall is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

More information

Detection and mitigation of Web Services Attacks using Markov Model

Detection and mitigation of Web Services Attacks using Markov Model Detection and mitigation of Web Services Attacks using Markov Model Vivek Relan RELAN1@UMBC.EDU Bhushan Sonawane BHUSHAN1@UMBC.EDU Department of Computer Science and Engineering, University of Maryland,

More information

Web-Application Security

Web-Application Security Web-Application Security Kristian Beilke Arbeitsgruppe Sichere Identität Fachbereich Mathematik und Informatik Freie Universität Berlin 29. Juni 2011 Overview Web Applications SQL Injection XSS Bad Practice

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information